skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Award ID contains: 1736417

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Network motifs are often called the building blocks of networks. Analysis of motifs has been found to be an indispensable tool for understanding local network structure, in contrast to measures based on node degree distribution and its functions that primarily address a global network topology. As a result, networks that are similar in terms of global topological properties may differ noticeably at a local level. This phenomenon of the impact of local structure has been recently documented in network fragility analysis and classification. At the same time, many studies of networks still tend to focus on global topological measures, often failing to unveil hidden mechanisms behind vulnerability of real networks and their dynamic response to malfunctions. In this paper, a study of motif-based analysis of network resilience and reliability under various types of intentional attacks is presented, with the goal of shedding light on local dynamics and vulnerability of networks. These methods are demonstrated on electricity transmission networks of 4 European countries, and the results are compared with commonly used resilience and reliability measures. 
    more » « less
  2. We demonstrate that an Internet of Things (IoT) botnet of high wattage devices–such as air conditioners and heaters–gives a unique ability to adversaries to launch large-scale coordinated attacks on the power grid. In particular, we reveal a new class of potential attacks on power grids called the Manipulation of demand via IoT (MadIoT) attacks that can leverage such a botnet in order to manipulate the power demand in the grid. We study five variations of the MadIoT attacks and evaluate their effectiveness via state-of-the-art simulators on real-world power grid models. These simulation results demonstrate that the MadIoT attacks can result in local power outages and in the worst cases, large-scale blackouts. Moreover, we show that these attacks can rather be used to increase the operating cost of the grid to benefit a few utilities in the electricity market. This work sheds light upon the interdependency between the vulnerability of the IoT and that of the other networks such as the power grid whose security requires attention from both the systems security and power engineering communities. 
    more » « less
  3. Identifying arbitrary topologies of power networks in real time is a computationally hard problem due to the number of hypotheses that grows exponentially with the network size. A “Learning-to-Infer” variational inference method is employed for efficient inference of every line status in the network. Optimizing the variational model is transformed to and solved as a discriminative learning problem based on Monte Carlo samples generated with power flow simulations. As the labeled data used for training can be generated in an arbitrarily large amount rapidly and at very little cost, the power of offline training is fully exploited to learn very complex classifiers for effective real-time topology identification. The Learning-to-Infer method is extensively evaluated in the IEEE 30, 118 and 300 bus systems. Excellent performance and scalability of the method in identifying arbitrary 
    more » « less
  4. A new method for intentional islanding of power grids is proposed, based on a data-driven and inherently geometric concept of data depth. The utility of the new depth-based islanding is illustrated in application to the Italian power grid. It is found that spectral clustering with data depths outperforms spectral clustering with k-means in terms of k-way expansion. Directions on how the k-depths can be extended to multilayer grids in a tensor representation are outlined. 
    more » « less
  5. Network motifs are often called the building blocks of networks. Analysis of motifs is found to be an indispensable tool for understanding local network structure, in contrast to measures based on node degree distribution and its functions that primarily address a global network topology. As a result, networks that are similar in terms of global topological properties may differ noticeably at a local level. In the context of power grids, this phenomenon of the impact of local structure has been recently documented in fragility analysis and power system classification. At the same time, most studies of power system networks still tend to focus on global topo-logical measures of power grids, often failing to unveil hidden mechanisms behind vulnerability of real power systems and their dynamic response to malfunctions. In this paper a pilot study of motif-based analysis of power grid robustness under various types of intentional attacks is presented, with the goal of shedding light on local dynamics and vulnerability of power systems. 
    more » « less